Search results for: user privacy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2536

Search results for: user privacy

1066 The Lived Experiences of South African Female Offenders and the Possible Links to Recidivism Due to their Exclusion from Educational Rehabilitation Programmes

Authors: Jessica Leigh Thornton

Abstract:

The South African Constitution outlines provisions for every detainee and sentenced prisoner in relation to the human rights recognized in the country since 1994; but currently, across the country, prisons have yet to meet many of these criteria. Consequently, their day-to-day lives are marked by extreme lack of privacy, high rates of infection, poor nutrition, and deleterious living conditions, which steadily erode prisoners’ mental and physical capacities rather than rehabilitating inmates so that they can effectively reintegrate into society. Even more so, policy reform, advocacy, security, and rehabilitation programs continue to be based on research and theories that were developed to explain the experiences of men, while female offenders are seen as the “special category” of inmates. Yet, the experiences of women and their pathways to incarceration are remarkably different from those of male offenders. Consequently, little is known about the profile, nature and contributing factors and experiences of female offenders which has impeded a comprehensive and integrated understanding of the subject of female criminality. The number of women globally in correctional centers has more than doubled over the past fifteen years (these increases vary from prison to prison and country to country). Yet, female offenders have largely been ignored in research even though the minority status of female offenders is a phenomenon that is not peculiar to South Africa as the number of women incarcerated has increased by 68% within the decade. Within South Africa, there have been minimal studies conducted on the gendered experience of offenders. While some studies have explored the pathways to female offending, gender-sensitive correctional programming for women that respond to their needs has been overlooked. This often leads to a neglect of the needs of female offenders, not only in terms of programs and services delivery to this minority group but also from a research perspective. In response, the aim of the proposed research is twofold: Firstly, the lived experiences and views of rehabilitation and reintegration of female offenders will be explored. Secondly, the various pathways into and out of recidivism amongst female offenders will be investigated regarding their inclusion in educational rehabilitation.

Keywords: female incarceration, educational rehabilitation, exclusion, experiences of female offenders

Procedia PDF Downloads 252
1065 RFID Laptop Monitoring and Management System

Authors: Francis E. Idachaba, Sarah Uyimeh Tommy

Abstract:

This paper describes the design of an RFID laptop monitoring and management system. Laptops embedded with RFID chips are monitored and tracked to provide a monitoring system for the purpose of tracking as well as monitoring movement of the laptops in and out of a building. The proposed system is implemented with both hardware and software components. The hardware architecture consists of RFID passive tag, RFID module (reader), and a server hosting the application and database. The RFID readers are distributed at major exits of a building or premises. The tags are programmed with owner laptop details are concealed in the laptops. The software architecture consists of application software that has the APIs (Applications Programming Interface) necessary to interface the RFID system with the PC, to achieve automated laptop monitoring system. A friendly graphic user interface (GUI) and a database that saves all readings and owners details. The system is capable of reducing laptop theft especially in students’ hostels as laptops can be monitored as they are taken either in or out of the building.

Keywords: asset tracking, GUI, laptop monitoring, radio frequency identification, passive tags

Procedia PDF Downloads 371
1064 Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure

Authors: Jiri F. Urbanek, Jiri Barta, Oldrich Svoboda, Jiri J. Urbanek

Abstract:

The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/ business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply-customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling.

Keywords: added value, DYVELOP, controlling, environments, process approach

Procedia PDF Downloads 393
1063 Exploring the Factors Affecting the Intention of Using Mobile Phone E-Book by TAM and IDT

Authors: Yen-Ku Kuo, Chie-Bein Chen, Jyh-Yi Shih, Kuang-Yi Lin, Chien-Han Peng

Abstract:

This study is primarily concerned with exploring what factors affect the consumer’s intention of using mobile phone e-book. In developing research structure, we adopted technology acceptance model (TAM) and Innovation Diffusion Theory (IDT) as a foundation. The analysis method of structural equation model (SEM) was used to carry out this study. Subjects were 261 users who are using or used the mobile phone e-book. The findings can be summed up as follows: (1) The subjective norm and job relevance has non-significant and positive influence to the perceived usefulness. This represents now the user are still in a small number and most of them used it in non-work related purpose. (2) The output quality, result demonstrability and perceived ease of use were confirmed to have positive and significant influence to the perceived usefulness. (3) The moderator “innovative diffusion” affects the relationship between the attitude and behavior intention. These findings could be a reference for the practice and future study to make further exploration.

Keywords: mobile phone e-book, technology acceptance model (TAM), innovation diffusion theory (IDT), structural equation model (SEM)

Procedia PDF Downloads 490
1062 A System Framework for Dynamic Service Deployment in Container-Based Computing Platform

Authors: Shuen-Tai Wang, Yu-Ching Lin, Hsi-Ya Chang

Abstract:

Cloud computing and virtualization technology have brought an innovative way for people to develop and use software nowadays. However, conventional virtualization comes at the expense of performance loss for applications. Container-based virtualization could be an option as it potentially reduces overhead and minimizes performance decline of the service platform. In this paper, we introduce a system framework and present an implementation of resource broker for dynamic cloud service deployment on the container-based platform to facilitate the efficient execution and improve the utilization. We target the load-aware service deployment approach for task ranking scenario. This proposed effort can collaborate with resource management system to adaptively deploy services according to the different requests. In particular, our approach relies on composing service immediately onto appropriate container according to user’s requirement in order to conserve the waiting time. Our evaluation shows how efficient of the service deployment is and how to expand its applicability to support the variety of cloud service.

Keywords: cloud computing, container-based virtualization, resource broker, service deployment

Procedia PDF Downloads 150
1061 Development of Hydrophobic Coatings on Aluminum Alloy 7075

Authors: Nauman A. Siddiqui

Abstract:

High performance requirement of aircrafts and marines industry demands to cater major industrial problems like wetting, high-speed efficiency, and corrosion resistance. These problems can be resolved by producing the hydrophobic surfaces on the metal substrate. By anodization process, the surface of AA 7075 has been modified and achieved a rough surface with a porous aluminum oxide (Al2O3) structure at nano-level. This surface modification process reduces the surface contact energy and increases the liquid contact angle which ultimately enhances the anti-icing properties. Later the Silane and Polyurethane (PU) coatings on the anodized surface have produced a contact angle of 130°. The results showed a good water repellency and self-cleaning properties. Using SEM analysis, micrographs revealed the round nano-porous oxide structure on the substrate. Therefore this technique can help in increasing the speed efficiency by reducing the friction with the outer interaction and can also be declared as a green technique since it is user-friendly.

Keywords: AA 7075, hydrophobicity, silanes, polyurethane, anodization

Procedia PDF Downloads 261
1060 Surveying the Effect of Cybernetics on Knowledge Management from Users' Viewpoint Who Are Members of Electronic Discussion Groups (ALA, ALIA)

Authors: Mitra Ghiasi, Roghayeh Ghorbani Bousari

Abstract:

Nowadays, the aim of the organizations is to gain sustainable competitive. So, developing their intellectual capital, encouraging innovation, increasing suitable performance can be done by knowledge management. Knowledge turns into science if knowledge is used to improve decision making, decision quality and make effective decisions. The current research intends to investigate the relationship between cybernetics and knowledge management from the perspective of users who are members of electronic discussion groups (ALA, ALIA). The research methodology is survey method, and it is a type of correlation research. Cybernetics and knowledge management questionnaires used for collecting data. The questionnaire that was designed in electronic format, distributed among two electronic discussion groups during 30 days and completed by 100 members of each electronic discussion groups. The finding of this research showed that although cybernetics has an impact on knowledge management, there is no significant difference between the ALA and ALIA user's view regard to effect of cybernetics on knowledge management. The results also indicated that this conceptual model is consistent with the data collected from the sample.

Keywords: ALA discussion group, ALIA discussion group, cybernetics, knowledge management

Procedia PDF Downloads 222
1059 Bank ATM Monitoring System Using IR Sensor

Authors: P. Saravanakumar, N. Raja, M. Rameshkumar, D. Mohankumar, R. Sateeshkumar, B. Maheshwari

Abstract:

This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer.

Keywords: ATM system, monitoring system, IR Transmitter, IR Receiver

Procedia PDF Downloads 293
1058 Smart and Active Package Integrating Printed Electronics

Authors: Joana Pimenta, Lorena Coelho, José Silva, Vanessa Miranda, Jorge Laranjeira, Rui Soares

Abstract:

In this paper, the results of R&D on an innovative food package for increased shelf-life are presented. SAP4MA aims at the development of a printed active device that enables smart packaging solutions for food preservation, targeting the extension of the shelf-life of the packed food through the controlled release of active natural antioxidant agents at the onset of the food degradation process. To do so, SAP4MA focuses on the development of active devices such as printed heaters and batteries/supercapacitors in a label format to be integrated on packaging lids during its injection molding process, promoting the passive release of natural antioxidants after the product is packed, during transportation and in the shelves, and actively when the end-user activates the package, just prior to consuming the product at home. When the active device present on the lid is activated, the release of the natural antioxidants embedded in the inner layer of the packaging lid in direct contact with the headspace atmosphere of the food package starts. This approach is based on the use of active functional coatings composed of nano encapsulated active agents (natural antioxidants species) in the prevention of the oxidation of lipid compounds in food by agents such as oxygen. Thus keeping the product quality during the shelf-life, not only when the user opens the packaging, but also during the period from food packaging up until the purchase by the consumer. The active systems that make up the printed smart label, heating circuit, and battery were developed using screen-printing technology. These systems must operate under the working conditions associated with this application. The printed heating circuit was studied using three different substrates and two different conductive inks. Inks were selected, taking into consideration that the printed circuits will be subjected to high pressures and temperatures during the injection molding process. The circuit must reach a homogeneous temperature of 40ºC in the entire area of the lid of the food tub, promoting a gradual and controlled release of the antioxidant agents. In addition, the circuit design involves a high level of study in order to guarantee maximum performance after the injection process and meet the specifications required by the control electronics component. Furthermore, to characterize the different heating circuits, the electrical resistance promoted by the conductive ink and the circuit design, as well as the thermal behavior of printed circuits on different substrates, were evaluated. In the injection molding process, the serpentine-shaped design developed for the heating circuit was able to resolve the issues connected to the injection point; in addition, the materials used in the support and printing had high mechanical resistance against the pressure and temperature inherent to the injection process. Acknowledgment: This research has been carried out within the Project “Smart and Active Packing for Margarine Product” (SAP4MA) running under the EURIPIDES Program being co-financed by COMPETE 2020 – the Operational Programme for Competitiveness and Internationalization and under Portugal 2020 through the European Regional Development Fund (ERDF).

Keywords: smart package, printed heat circuits, printed batteries, flexible and printed electronic

Procedia PDF Downloads 90
1057 Understanding of the Impact of Technology in Collaborative Programming for Children

Authors: Nadia Selene Molina-Moreno, Maria Susana Avila-Garcia, Marco Bianchetti, Marcelina Pantoja-Flores

Abstract:

Visual Programming Tools available are a great tool for introducing children to programming and to develop a skill set for algorithmic thinking. On the other hand, collaborative learning and pair programming within the context of programming activities, has demonstrated to have social and learning benefits. However, some of the online tools available for programming for children are not designed to allow simultaneous and equitable participation of the team members since they allow only for a single control point. In this paper, a report the work conducted with children playing a user role is presented. A preliminary study to cull ideas, insights, and design considerations for a formal programming course for children aged 8-10 using collaborative learning as a pedagogical approach was conducted. Three setups were provided: 1) lo-fi prototype, 2) PC, 3) a 46' multi-touch single display groupware limited by the application to a single touch entry. Children were interviewed at the end of the sessions in order to know their opinions about teamwork and the different setups defined. Results are mixed regarding the setup, but they agree to like teamwork.

Keywords: children, collaborative programming, visual programming, multi-touch tabletop, lo-fi prototype

Procedia PDF Downloads 290
1056 Rethinking News Aggregation to Achieve Depolarization

Authors: Kushagra Khandelwal, Chinmay Anand, Sharmistha Banerjee

Abstract:

This paper presents an approach to news aggregation that is aimed at solving the issues centered on depolarization and manipulation of news information and stories. Largest democracies across the globe face numerous issues related to news democratization. With the advancements in technology and increasing outreach, web has become an important information source which is inclusive of news. Research was focused on the current millennial population consisting of modern day internet users. The study involved literature review, an online survey, an expert interview with a journalist and a focus group discussion with the user groups. The study was aimed at investigating problems associated with the current news system from both the consumer as well as distributor point of view. The research findings helped in producing five key potential opportunity areas which were explored for design intervention. Upon ideation, we identified five design features which include opinion aggregation. Categorized opinions, news tracking, online discussion and ability to take actions that support news democratization.

Keywords: citizen journalism, democratization, depolarized news, napsterization, news aggregation, opinions

Procedia PDF Downloads 194
1055 Safe Routes to Schools (SRTS): Children’ Safety Improvement Under COVID-19 Pandemic Conditions in Jordan

Authors: Khair Jadaan, Qasem Alqasem

Abstract:

School children are vulnerable road user groups and are particularly at high risk calling for the need to improve their safety. Safe Routes to Schools (SRTS) concept is considered as one safety improvement approach that would effectively help improve school children’s safety. This paper aims to determine the best practice SRTS for Jordan based on the international experience attained through extensive and selected literature review falling under the 5 E’s and additionally on information/data collected through a survey performed using an online predesigned questionnaire to investigate the reactions and attitudes of students and their parents towards the proposed SRTS program. Data are analyzed using SPSS and MS software, especially Excel, in addition to some literature reviews inserted in this study. The results represent some recommendations that are strongly believed to help decision makers to develop the current safety conditions of the school routes. The challenges that the implementation of this program would face including COVID-19 protection for teachers and students are addressed.

Keywords: children, COVID-19, Jordan, safety, school, SRTS, 5 E’s

Procedia PDF Downloads 99
1054 Clarifier Dialogue Interface to resolve linguistic ambiguities in E-Learning Environment

Authors: Dalila Souilem, Salma Boumiza, Abdelkarim Abdelkader

Abstract:

The Clarifier Dialogue Interface (CDI) is a part of an online teaching system based on human-machine communication in learning situation. This interface used in the system during the learning action specifically in the evaluation step, to clarify ambiguities in the learner's response. The CDI can generate patterns allowing access to an information system, using the selectors associated with lexical units. To instantiate these patterns, the user request (especially learner’s response), must be analyzed and interpreted to deduce the canonical form, the semantic form and the subject of the sentence. For the efficiency of this interface at the interpretation level, a set of substitution operators is carried out in order to extend the possibilities of manipulation with a natural language. A second approach that will be presented in this paper focuses on the object languages with new prospects such as combination of natural language with techniques of handling information system in the area of online education. So all operators, the CDI and other interfaces associated to the domain expertise and teaching strategies will be unified using FRAME representation form.

Keywords: dialogue, e-learning, FRAME, information system, natural language

Procedia PDF Downloads 359
1053 ROOP: Translating Sequential Code Fragments to Distributed Code Fragments Using Deep Reinforcement Learning

Authors: Arun Sanjel, Greg Speegle

Abstract:

Every second, massive amounts of data are generated, and Data Intensive Scalable Computing (DISC) frameworks have evolved into effective tools for analyzing such massive amounts of data. Since the underlying architecture of these distributed computing platforms is often new to users, building a DISC application can often be time-consuming and prone to errors. The automated conversion of a sequential program to a DISC program will consequently significantly improve productivity. However, synthesizing a user’s intended program from an input specification is complex, with several important applications, such as distributed program synthesizing and code refactoring. Existing works such as Tyro and Casper rely entirely on deductive synthesis techniques or similar program synthesis approaches. Our approach is to develop a data-driven synthesis technique to identify sequential components and translate them to equivalent distributed operations. We emphasize using reinforcement learning and unit testing as feedback mechanisms to achieve our objectives.

Keywords: program synthesis, distributed computing, reinforcement learning, unit testing, DISC

Procedia PDF Downloads 82
1052 Addictive Use Due to Personality: Focused on Big Five Personality Traits and Game Addiction

Authors: Eui Jun Jeong, Hye Rim Lee, Ji Hye Yoo

Abstract:

Recent studies have verified the significant relationship of user personality with Internet use. However, in game studies, little research has emphasized on the effects of personality traits on game addiction. This study examined whether big five personality traits affect game addiction with control of psychological, social, and demographic factors. Specifically, using data from a survey of 789 game users in Korea, we conducted a regression analysis to see the associations of psychological (loneliness/depression), social (activities with family/friends), self-efficacy (game/general), gaming (daily gaming time/perception), demographic (age/gender), and personality traits (extraversion, neuroticism conscientiousness, agreeableness, & openness) with the degree of game addiction. Results showed that neuroticism increase game addiction with no effect of extraversion on the addiction. General self-efficacy negatively affected game addiction, whereas game self-efficacy increased the degree of game addiction. Loneliness enhanced game addiction while depression showed a negative effect on the addiction. Results and implications are discussed.

Keywords: game addiction, big five personality, social activities, self-efficacy, loneliness, depression

Procedia PDF Downloads 552
1051 Numerical Analysis of Fire Performance of Timber Structures

Authors: Van Diem Thi, Mourad Khelifa, Mohammed El Ganaoui, Yann Rogaume

Abstract:

An efficient numerical method has been developed to incorporate the effects of heat transfer in timber panels on partition walls exposed to real building fires. The procedure has been added to the software package Abaqus/Standard as a user-defined subroutine (UMATHT) and has been verified using both time-and spatially dependent heat fluxes in two- and three-dimensional problems. The aim is to contribute to the development of simulation tools needed to assist structural engineers and fire testing laboratories in technical assessment exercises. The presented method can also be used under the developmental stages of building components to optimize performance in real fire conditions. The accuracy of the used thermal properties and the finite element models was validated by comparing the predicted results with three different available fire tests in literature. It was found that the model calibrated to results from standard fire conditions provided reasonable predictions of temperatures within assemblies exposed to real building fire.

Keywords: Timber panels, heat transfer, thermal properties, standard fire tests

Procedia PDF Downloads 321
1050 Clustering Performance Analysis using New Correlation-Based Cluster Validity Indices

Authors: Nathakhun Wiroonsri

Abstract:

There are various cluster validity measures used for evaluating clustering results. One of the main objectives of using these measures is to seek the optimal unknown number of clusters. Some measures work well for clusters with different densities, sizes and shapes. Yet, one of the weaknesses that those validity measures share is that they sometimes provide only one clear optimal number of clusters. That number is actually unknown and there might be more than one potential sub-optimal option that a user may wish to choose based on different applications. We develop two new cluster validity indices based on a correlation between an actual distance between a pair of data points and a centroid distance of clusters that the two points are located in. Our proposed indices constantly yield several peaks at different numbers of clusters which overcome the weakness previously stated. Furthermore, the introduced correlation can also be used for evaluating the quality of a selected clustering result. Several experiments in different scenarios, including the well-known iris data set and a real-world marketing application, have been conducted to compare the proposed validity indices with several well-known ones.

Keywords: clustering algorithm, cluster validity measure, correlation, data partitions, iris data set, marketing, pattern recognition

Procedia PDF Downloads 95
1049 Exploring the Situational Approach to Decision Making: User eConsent on a Health Social Network

Authors: W. Rowan, Y. O’Connor, L. Lynch, C. Heavin

Abstract:

Situation Awareness can offer the potential for conscious dynamic reflection. In an era of online health data sharing, it is becoming increasingly important that users of health social networks (HSNs) have the information necessary to make informed decisions as part of the registration process and in the provision of eConsent. This research aims to leverage an adapted Situation Awareness (SA) model to explore users’ decision making processes in the provision of eConsent. A HSN platform was used to investigate these behaviours. A mixed methods approach was taken. This involved the observation of registration behaviours followed by a questionnaire and focus group/s. Early results suggest that users are apt to automatically accept eConsent, and only later consider the long-term implications of sharing their personal health information. Further steps are required to continue developing knowledge and understanding of this important eConsent process. The next step in this research will be to develop a set of guidelines for the improved presentation of eConsent on the HSN platform.

Keywords: eConsent, health social network, mixed methods, situation awareness

Procedia PDF Downloads 266
1048 Deep Learning-Based Channel Estimation for Reconfigurable Intelligent Surface-Assisted Unmanned Aerial Vehicle-Enabled Wireless Communication System

Authors: Getaneh Berie Tarekegn

Abstract:

Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environments, the movement of UAVs can be blocked by trees and high-rise buildings that obstruct directional paths. With reconfigurable intelligent surfaces (RIS), this problem can be effectively addressed. To achieve this goal, accurate channel estimation in RIS-assisted UAV-enabled wireless communications is crucial. This paper proposes an accurate channel estimation model using long short-term memory (LSTM) for a multi-user RIS-assisted UAV-enabled wireless communication system. According to simulation results, LSTM can improve the channel estimation performance of RIS-assisted UAV-enabled wireless communication.

Keywords: channel estimation, reconfigurable intelligent surfaces, long short-term memory, unmanned aerial vehicles

Procedia PDF Downloads 72
1047 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 283
1046 Socio-Ecological Factors Characterising Migrants and Refugee Youth’s Sexual and Reproductive Health and Rights

Authors: Michaels Aibangbee, Sowbhagya Micheal, Pranee Liamputtong, Elias Mpofu, Tinashe Dune

Abstract:

Background: The challenges migrants and refugee youth (MRY) experience in maintaining their sexual and reproductive health and rights (SRHR) continues to be a global public health issue. Consequently, MRY is more likely to encounter adverse SRH experiences due to limited access to and knowledge of SRH services. Using a socio-ecological framework, this study examined the MRY’s SRHR micro-level experiences to macro-levels analyses of SRH-related social systems and constructions. Methods: Eighteen focus groups were conducted using participatory action research (PAR) methodology to understand the phenomena. The focus groups included MRY participants (ages 16-26) living in Greater Western Sydney and facilitated by youth project liaisons (YPL). The data was afterward synthesised and analysed using the thematic-synthesis method. Results: In total, 86 MRY (male n= 25, female n= 61) MRY (across 20 different cultural backgrounds) participated in the focus groups. The findings identified socio-ecological factors characterising MRY SRHR, highlighting facilitators such as social media and significant barriers such as lack of access to services and socio-cultural dissonance, and the under-implementation of SRHR support and services by MRY. Key themes from the data included traditional and institutional stigma, lack of SRH education, high reliance on social media for SRH information, anonymity, and privacy concerns. Conclusion: The data shows a limited extent to which MRY SRHR is considered and the intergenerational understanding and stigma affecting the rights of MRY. Therefore, these findings suggest a need for policies and practices to empower MRY’s agency through a collaborative SRHR strategy and policy design to maintain relevance in multicultural contexts.

Keywords: migrant and refugee youth, sexual health, reproductive health, sexual and reproductive health and rights, culture, agency

Procedia PDF Downloads 50
1045 Institutional Repository ePrints at Indian Institute of Science: A Special Reference to JRD Tata Memorial Library, Bangalore, India

Authors: Nagarjuna Pitty

Abstract:

Over the past decade there has been substantial progress in the usage of ePrints resources national and international research community. JRD Tata Memorial Library has hosting for the web based ePrints services and maintenance to online user community. This paper provides an overview how to share JRDTML experiences in using GNU EPrints.org software to create and maintain the open-access institutional repository of IISc, ePrints@IISc. This paper states that the GNU EPrints.org is the first generic software for creating Open Access Initiative (OAI)-compliant repositories, which enables the researchers to self-archive their research publications thus facilitating open access to their publications. IISc has been using this software since early 2002. This paper tells that the GNU EPrints.org software is an excellent tool for creating and maintaining OAI-compliant repositories. It can be setup easily even by those who are not too much experts in computer. In this paper, author is sharing JRDTML experiences in using GNU ePrints.org software.

Keywords: digital library, open access initiative, scholarly publications, institutional repository, ePrints@IISc

Procedia PDF Downloads 545
1044 Gradient Boosted Trees on Spark Platform for Supervised Learning in Health Care Big Data

Authors: Gayathri Nagarajan, L. D. Dhinesh Babu

Abstract:

Health care is one of the prominent industries that generate voluminous data thereby finding the need of machine learning techniques with big data solutions for efficient processing and prediction. Missing data, incomplete data, real time streaming data, sensitive data, privacy, heterogeneity are few of the common challenges to be addressed for efficient processing and mining of health care data. In comparison with other applications, accuracy and fast processing are of higher importance for health care applications as they are related to the human life directly. Though there are many machine learning techniques and big data solutions used for efficient processing and prediction in health care data, different techniques and different frameworks are proved to be effective for different applications largely depending on the characteristics of the datasets. In this paper, we present a framework that uses ensemble machine learning technique gradient boosted trees for data classification in health care big data. The framework is built on Spark platform which is fast in comparison with other traditional frameworks. Unlike other works that focus on a single technique, our work presents a comparison of six different machine learning techniques along with gradient boosted trees on datasets of different characteristics. Five benchmark health care datasets are considered for experimentation, and the results of different machine learning techniques are discussed in comparison with gradient boosted trees. The metric chosen for comparison is misclassification error rate and the run time of the algorithms. The goal of this paper is to i) Compare the performance of gradient boosted trees with other machine learning techniques in Spark platform specifically for health care big data and ii) Discuss the results from the experiments conducted on datasets of different characteristics thereby drawing inference and conclusion. The experimental results show that the accuracy is largely dependent on the characteristics of the datasets for other machine learning techniques whereas gradient boosting trees yields reasonably stable results in terms of accuracy without largely depending on the dataset characteristics.

Keywords: big data analytics, ensemble machine learning, gradient boosted trees, Spark platform

Procedia PDF Downloads 227
1043 Realization of Wearable Inertial Measurement Units-Sensor-Fusion Harness to Control Therapeutic Smartphone Applications

Authors: Svilen Dimitrov, Manthan Pancholi, Norbert Schmitz, Didier Stricker

Abstract:

This paper presents the end-to-end development of a wearable motion sensing harness consisting of computational unit and four inertial measurement units to control three smartphone therapeutic games for children. The inertial data is processed in real time to obtain lower body motion information like knee raises, feet taps and squads. By providing a Wi-Fi connection interface the sensor harness acts wireless remote control for smartphone applications. By performing various lower body movements the users provoke corresponding game state changes. In contrary to the current similar offers, like Nintendo Wii Remote, Xbox Kinect and Playstation Move, this product, consisting of the sensor harness and the applications on top of it, are fully wearable, which means they do not rely on the user to be bound to concrete soft- or hardwareequipped space.

Keywords: wearable harness, inertial measurement units, smartphone therapeutic games, motion tracking, lower-body activity monitoring

Procedia PDF Downloads 388
1042 Pallet Tracking and Cost Optimization of the Flow of Goods in Logistics Operations by Serial Shipping Container Code

Authors: Dominika Crnjac Milic, Martina Martinovic, Vladimir Simovic

Abstract:

The case study method in this paper shows the implementation of Information Technology (IT) and the Serial Shipping Container Code (SSCC) in a Croatian company that deals with logistics operations and provides logistics services in the cold chain segment. This company is aware of the sensitivity of the goods entrusted to them by the user of the service, as well as of the importance of speed and accuracy in providing logistics services. To that end, it has implemented and used the latest IT to ensure the highest standard of high-quality logistics services to its customers. Looking for efficiency and optimization of supply chain management, while maintaining a high level of quality of the products that are sold, today's users of outsourced logistics services are open to the implementation of new IT products that ultimately deliver savings. By analysing the positive results and the difficulties that arise when using this technology, we aim to provide an insight into the potential of this approach of the logistics service provider.

Keywords: logistics operations, serial shipping container code, information technology, cost optimization

Procedia PDF Downloads 348
1041 An Adaptive Virtual Desktop Service in Cloud Computing Platform

Authors: Shuen-Tai Wang, Hsi-Ya Chang

Abstract:

Cloud computing is becoming more and more matured over the last few years and consequently the demands for better cloud services is increasing rapidly. One of the research topics to improve cloud services is the desktop computing in virtualized environment. This paper aims at the development of an adaptive virtual desktop service in cloud computing platform based on our previous research on the virtualization technology. We implement cloud virtual desktop and application software streaming technology that make it possible for providing Virtual Desktop as a Service (VDaaS). Given the development of remote desktop virtualization, it allows shifting the user’s desktop from the traditional PC environment to the cloud-enabled environment, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. Users no longer need to burden the platform maintenances and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote desktop service represents the next significant step to the mobile workplace, and it lets users access their desktop environments from virtually anywhere.

Keywords: cloud computing, virtualization, virtual desktop, VDaaS

Procedia PDF Downloads 267
1040 Anomaly Detection with ANN and SVM for Telemedicine Networks

Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos

Abstract:

In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.

Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines

Procedia PDF Downloads 340
1039 A Mechanism of Reusable, Portable, and Reliable Script Generator on Android

Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu

Abstract:

A good automated testing tool could reduce as much as possible the manual work done by testers. Traditional record-replay testing tool provides an automated testing solution by recording mouse coordinates as test scripts, but it will be easily broken if any change of resolutions. Therefore, more and more testers design multiple test scripts to automate the testing process for different devices. In order to improve the traditional record-replay approach and reduce the effort that the testers spending on writing test scripts, we propose an approach for generating the Android application test scripts based on accessibility service without connecting to a computer. This approach simulates user input actions and replays them correctly even at the different conditions such as the internet connection is unstable when the device under test, the different resolutions on Android devices. In this paper, we describe how to generate test scripts automatically and make a comparison with existing tools for Android such as Robotium, Appium, UIAutomator, and MonkeyTalk.

Keywords: accessibility service, Appium, automated testing, MonkeyTalk, Robotium, testing, UIAutomator

Procedia PDF Downloads 356
1038 Water Monitoring Sentinel Cloud Platform: Water Monitoring Platform Based on Satellite Imagery and Modeling Data

Authors: Alberto Azevedo, Ricardo Martins, André B. Fortunato, Anabela Oliveira

Abstract:

Water is under severe threat today because of the rising population, increased agricultural and industrial needs, and the intensifying effects of climate change. Due to sea-level rise, erosion, and demographic pressure, the coastal regions are of significant concern to the scientific community. The Water Monitoring Sentinel Cloud platform (WORSICA) service is focused on providing new tools for monitoring water in coastal and inland areas, taking advantage of remote sensing, in situ and tidal modeling data. WORSICA is a service that can be used to determine the coastline, coastal inundation areas, and the limits of inland water bodies using remote sensing (satellite and Unmanned Aerial Vehicles - UAVs) and in situ data (from field surveys). It applies to various purposes, from determining flooded areas (from rainfall, storms, hurricanes, or tsunamis) to detecting large water leaks in major water distribution networks. This service was built on components developed in national and European projects, integrated to provide a one-stop-shop service for remote sensing information, integrating data from the Copernicus satellite and drone/unmanned aerial vehicles, validated by existing online in-situ data. Since WORSICA is operational using the European Open Science Cloud (EOSC) computational infrastructures, the service can be accessed via a web browser and is freely available to all European public research groups without additional costs. In addition, the private sector will be able to use the service, but some usage costs may be applied, depending on the type of computational resources needed by each application/user. Although the service has three main sub-services i) coastline detection; ii) inland water detection; iii) water leak detection in irrigation networks, in the present study, an application of the service to Óbidos lagoon in Portugal is shown, where the user can monitor the evolution of the lagoon inlet and estimate the topography of the intertidal areas without any additional costs. The service has several distinct methodologies implemented based on the computations of the water indexes (e.g., NDWI, MNDWI, AWEI, and AWEIsh) retrieved from the satellite image processing. In conjunction with the tidal data obtained from the FES model, the system can estimate a coastline with the corresponding level or even topography of the inter-tidal areas based on the Flood2Topo methodology. The outcomes of the WORSICA service can be helpful for several intervention areas such as i) emergency by providing fast access to inundated areas to support emergency rescue operations; ii) support of management decisions on hydraulic infrastructures operation to minimize damage downstream; iii) climate change mitigation by minimizing water losses and reduce water mains operation costs; iv) early detection of water leakages in difficult-to-access water irrigation networks, promoting their fast repair.

Keywords: remote sensing, coastline detection, water detection, satellite data, sentinel, Copernicus, EOSC

Procedia PDF Downloads 109
1037 Investigation on Hand-Woven School Uniform Initiative and Sustainability: The Kerala Model from India

Authors: Abhilash Balan Paleri

Abstract:

Hand woven fabric embellishes an exceptional identity in the social milieu of Kerala; still, the artisans and handloom sector is undergoing crisis due to various reasons. The hand woven school uniform initiative of Govt. of Kerala launched in 2016 aims at enhancing the sector, ensuring sustainability at artisan and end-user levels. The Kerala Government already distributed 23 lakhs meters of cloth (for shirting, suiting, and skirting) woven by 4085 artisans in their traditional looms covering 4.5 lakhs of students in the public education sector which covers cover 3,701 schools in the state. The 2019-20 year production is expected to be 42 Lakhs meters of hand woven clothing catering 8.6 lakhs of students in the primary sector. This particular investigation unveils the upshots of the initiative, and the observations are derived through systematic enquiry with artisans, authorities, and end-users. The findings show a remarkable positive impact in the livelihood of artisans and the entire handloom sector.

Keywords: handloom school uniform initiative of Kerala, hand woven fabric, sustainability, handloom weavers

Procedia PDF Downloads 135